O'Reilly logo

Linux® For Dummies®, 8th Edition by Richard Blum, Dee-Ann LeBlanc

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Step 8: Configure Security

Okay, so now you have your wireless access point working, but there’s just one small problem — anyone can use it! If you’re running a public access network, I suppose that could be a good thing, but for most of us, this means problems.

The smart thing to do is lock down the wireless access point so only authorized devices can use it. Here’s how:

1.
From the GUI desktop, choose SystemAdministrationNetwork. If you’re logged in as a regular user (not root), you’re prompted to enter the root password.
2.
In the Network Configuration dialog box, double-click your detected wireless network card. The Wireless Device Configuration dialog box (refer to Figure 19-3) appears, showing the current settings for the wireless network card.
3.
Click the Wireless Settings tab to change your wireless access point configuration settings.
4.
Enter a 13-character hexadecimal or ASCII encryption key in the Key text box. The wireless network card uses the Wired Equivalent Protocol (WEP) to encrypt data sent across the wireless network. WEP requires a 13-character hexadecimal or ASCII key. Select a unique key to encrypt your data. If you select a hexadecimal key, you must precede the key with a 0x.
5.
Click OK to exit the Wireless Device Configuration dialog box, and then click ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required